Content
October 2014, Volume VIII, Issue 4
- 7-15 Performance of Modified Elliptic Curve Digital Signature Algorithm on Cloud Data
by M Gayatri - 16-23 Comparing the Properties of Communities Using Ontology
by Vijay Nayak & Bhaskar Biswas - 24-30 Improving Website Ranking for Multi-Term Query Search Based on Its Trustworthiness
by Nikhil Agrawal & Vidhyadhar Jain & Bhaskar Biswas - 31-42 Performance Enhancement of Image Filtering on GPU Using CUDA
by B Ramadasu - 43-49 Video Compression Using Improved QPSO Technique and 3D-DWT
by Sk. Jumlesha & Ch. Satyanarayana - 50-57 Robust Digital Image Watermarking Using 3AES in Wavelet Domain
by Chittaranjan Pradhan & Bidyut Jyoti Saha & Arundhati Sahoo & Ajay Kumar Bisoi
July 2014, Volume VIII, Issue 3
- 7-19 Application of Firefly Algorithm in Prediction of Time Series Data
by Satyendra Nath Mandal & Jit Saha - 20-33 A Multi-Agent Based Personalized Search Engine with Topical Crawling Capabilities
by Disha Verma & Kanika Minocha & Barjesh Kochar - 34-46 A Hybrid Approach for Determining the Efficient Network Intrusion Detection System
by Jamal Hussain & Samuel Lalmuanawma - 47-60 Effective Cluster Head Selection Based on EDM for WSN
by Veena Bhat & Sharada U Shenoy
April 2014, Volume VIII, Issue 2
- 7-24 Speaker Recognition Using Gaussian Mixture Model
by Satyendra Nath Mandal & Abhranil Chatterjee & Debayan Das - 25-34 Load Balancing Algorithm: An Analytical Study
by Varsha Thakur & Sanjay Kumar - 35-40 Design of an Electronic Diagnosis System for Automobiles
by Sunday Tunmibi & Ayodeji Dasylva - 41-48 Lung Disease Classification Using Shape-Based Feature Extraction Technique
by C Bhuvaneswari & P Aruna & D Loganathan - 49-57 A Generalized Parametric Information Measure and Some Coding Theorems
by Satish Kumar & Arvind Kumar
January 2014, Volume VIII, Issue 1
- 7-25 A Novel System Hardening Technique Against Malicious Penetration Attempts
by Ogwueleka Francisca N & Inyiama Hyacinth C & Omebije John A - 26-72 A Novel Approach to Designing and Implementing Context-Aware Mobile Phone
by Thyagaraju G S & Vivek G Bhat & U P Kulkarni
October 2013, Volume VII, Issue 4
- 7-17 Designing a Ranking-Based Expert Finder Using Recommender Algorithms
by Vidushi & Satish Chandra - 18-29 Predicting Quality Using Fuzzy Model on Object-Oriented Software Design
by Garima Verma & Pradeep Tomar - 30-38 BaseTen Cryptographic Algorithm Based on Playfair Cipher
by Sombir Singh & Arvind Kumar - 39-47 Improved Virtual MANET Scheme for Internet Connectivity in Mobile Ad Hoc Network
by C Rampriya - 48-59 A Review of Factors That Affect Cloud Computing Adoption
by Shailja Tripathi & Nasina Jigeesh
July 2013, Volume VII, Issue 3
- 7-26 Performance of a Few Gang Scheduling Algorithms for Multiprocessor Scheduling
by R Siyambalapitiya & M Sandirigama - 27-34 Preprocessing Techniques for Effective Data Extraction and Computation
by M Saraswathi & V Balu - 35-42 A Division Algorithm-Based Symmetric Key Encryption Algorithm
by Shriram B Patil - 43-48 A Heart Disease Prediction Model Using Decision Tree
by Atul Kumar Pandey & Prabhat Pandey & K L Jaiswal - 49-56 Enhanced Fuzzy Image Processing Algorithm for Multi-Focus Image Fusion
by Ramasamy Mariappan
April 2013, Volume VII, Issue 2
- 7-24 A Brief Review of Accuracy of Classifiers Based on Radial Basis Function Neural Networks
by Ajit Kumar Behera & Ch Sanjeev Kumar Dash & Satchidananda Dehuri - 25-38 An Innovative Idea to Represent Tree in Huffman Data Compression Algorithm
by Satyendra Nath Mandal - 39-46 Enhancing Data Security in Cloud Computing Environment
by Ramalingam Sugumar & A Janet Rajeswari & Shanmugasundaram Hariharan - 47-55 Seamless Integration of On-Demand and On-Premise Applications Using Clouds
by Ramya Raja & Muthiyalian Raja - 56-64 Non-Redundant Web Services Composition Search System
by Francisca Nonyelum Ogwueleka
January 2013, Volume VII, Issue 1
- 7-36 Design and Implementation of an Object-Oriented Operating System
by Pinaki Chakraborty - 37-52 Innovative ICT Through Cloud Computing
by Harman Preet Singh & Arvind Bhisikar & Jitendra Singh - 53-61 Performance Analysis of VoIP and Voice over MPLS Networks
by J Faritha Banu & V Ramachandran - 62-72 A Neural Network Approach for Cardiac Arrhythmia Classification
by R Ganesh Kumar & Y S Kumaraswamy
October 2012, Volume VI, Issue 4
- 7-34 Design and Implementation of Prototyping Simulator of Context-Aware Applications
by Thyagaraju G S & U P Kulkarni - 35-47 Event-Based Data Gathering from Master Section Head by Mobile Agent in Homogeneous Sensor Networks
by S Karthikeyan & S Jayashri - 48-62 Identifying Optimum Inventory by Using Genetic Algorithm with Special Reference to Automobile Sector
by Sanjay Jain & Kapil Sharma
July 2012, Volume VI, Issue 3
- 7-23 Integration of Data Mining Techniques with Database Management System
by Mohd Ghouse Mohiuddin - 24-34 IRAF: Intensified Reputed ARAN Using Fuzzy Logic
by R Sudha & D Sivakumar - 35-69 Static Context Model and Metrics for Assessing the Completeness and Understandability of Static Context Model
by G S Thyagaraju & U P Kulkarni
April 2012, Volume VI, Issue 2
- 7-19 Dependency Management in Component-Based Evolving Software Systems
by Kuljit Kaur - 20-33 Fuzzy-Based Approach Using Enhanced Function Point to Evaluate the Performance of Software Project
by M Pauline & P Aruna & B Shadaksharappa - 34-44 A Novel Security Model for Denial of Service Attacks on Multi-Party Key Exchange Protocol
by Parvinder Singh & Ashish Mehta - 45-51 Analysis and Implementation of Transposition Techniques
by Satish Bansal & Rajesh Srivastava - 52-57 Restructuring 2D Objects in 3D World Using Augmented Reality-Based Future Classroom
by Vishal Mehta - 58-65 Influence of Immigration Parameter for Understanding Growth of Computer Virus in SIR Model
by N Suresh Rao
January 2012, Volume VI, Issue 1
- 7-16 A Fuzzy C-Medoids-Based CLARA Algorithm for Fast Image Segmentation
by Y V Ramana Rao & S Abirami - 17-22 A Comparative Analysis of Huffman Coding with Uniform Coding
by Pinaki Mitra - 23-30 Design of Knowledge-Based Efficient Speed Optimization Algorithm in Unplanned Traffic
by Prasun Ghosal & Arijit Chakraborty & Sabyasachee Banerjee - 31-38 Selecting Plaintext in Rabin Cryptosystems Using Padding Generated by Pseudo-Random Bit Generators
by Bh. Padma & D Chandravathi - 39-56 The Application of the Inclusion-Exclusion Principle in Learning Monotonic Boolean Functions
by Christopher Gaffney & Thomas Quint